Submit your search
2022-02-16
We have become a Block Producer on XPR Network ⚛️

We are excited to announce that we have become Block Producer on XPR Network ⚛️ ecosystem. We have learned a lot through the process of becoming a Block Producer and right now we are ready to contribute to the XPR ecosystem. Security is our priority We are primarily focused to provide greater security for the […]

Read More
2022-02-07
What is social engineering?

In a broader sense, any kind of manipulation linked to behavioral psychology can be considered social engineering. However, the concept is not always related to criminal or fraudulent activities. In fact, social engineering is being widely used and studied in a variety of contexts, in fields like social sciences, psychology, and marketing. When it comes […]

Read More
2022-02-06
What is a dusting attack and how to spot it?

A dusting attack refers to a relatively new kind of malicious activity where hackers and scammers try to gain access to the funds of users by sending tiny amounts of coins to their wallets. The transactional activity of these wallets is then tracked down by the attackers, who perform a combined analysis of different addresses […]

Read More
2022-01-31
How to create PGP keys to encrypt and sign files

Pretty Good Privacy (PGP) is an encryption system used for both sending encrypted emails and encrypting sensitive files. Since its invention back in 1991, PGP has become the de facto standard for email security. The popularity of PGP is based on two factors. The first is that the system was originally available as freeware, and […]

Read More
2022-01-27
Investigation of websites and Telegram groups that are stealing private keys

The rise in popularity of cryptocurrencies has encouraged cybercriminals to find innovative ways to attack markets, users and any structure where cryptocurrencies are stored. In simple words, if an attacker is able to exploit some area of a chain, smart contract, exchange or illegitimately withdraw cryptocurrency, it would be deemed as a hack or stealing. […]

Read More
2022-01-26
How to sign a file or message using gpg?

Many businesses are responsible for maintaining large amounts of confidential data, including customer records, medical records, financial reports, sensitive documents, and much more. It’s very common for these types of information to be transmitted via email or other services. So how can you ensure confidential data transmitted via email is kept private? How can you […]

Read More

Ready for Action?

Don’t hesitate to contact us if you need more information.
Let's Go!
ALVOSEC
BTC: bc1qnn4zfqqtexl4fkjk2vz6tk74sn92x326wwn0ph

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram